Professional Documents
Culture Documents
Advance Networking Technologies: Atharva College of Engineering
Advance Networking Technologies: Atharva College of Engineering
Lab Report
Prepared By
Diwakar Thakur
Roll No. 56
......
Instructor
Prof. Shikha S.
4 Installation of Proxy-Server 11
4.1 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.3 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5 Installation of Mail-Server 14
5.1 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.3 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6 Installation of Web-Server 16
6.1 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.3 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
i
Experiment 1
1.1 Aim
To Study and Execution of Basic Networking Commands
1.2 Software
Operating System, Command Prompt
1.3 Theory
IPCONFIG
When this command is issued it displays the following information in an easily readable
format that allows you to evaluate whether or not the network adapter is being assigned
the necessary information:
Connection specific DNS Suffix: (usually blank)
IP Address. (IP Address assigned to the active network adapter)
Subnet Mask. : 255.255.255.255
Default Gateway : 10.120.62.128
The important information here is that your device is assigned an IP Address and a De-
fault Gateway.
IPCONFIG/ALL
The usage of the ALL argument instructs IPCONFIG to display more detailed informa-
tion regarding the active network adapters features:
Windows IP Configuration:
(Note: The values listed in the Windows IP Configuration section are not relevant to
tethering.)
Host Name. . . (Machine’s Host Name)
1
Primary DNS Suffix isp.com
Node Type...... Hybrid
IP Routing Enabled...... No
WINS Proxy Enabled...... No
DNS Suffix Search Lists...... isp.com
(note: If not tethering or using PC card, these values may be different) PPP adapter
(GPRS Connection Name):
Connection pecific DNS Suffix: (usually blank) Description WAN (PPP/SLIP) Interface
Physical Address...... (MAC address of the active device)
DHCP Enabled...... Yes (Will be No if using Dialup Networking connection)
PING
The PING command is used to establish whether or not there is connectivity from the
active network adapter to a given URL or IP.
When run it returns the following information:
The IP of the URL/IP that you specified.
The number of bytes in each packet sent. (The default is 32 bytes.) Example: PING
www.google.com
Ping should be your first stop for network troubleshooting. Ping is useful for determining
whether or not a customer can access a site and how long packets of data take to make
the trip. Using this tool you can discover if packets are being lost in transit, how long
they are taking.
NETSTAT
The NETSTAT command displays protocol statistics and current TCP/IP network con-
nections. When run it returns the following information: Which ports are enabled for
TCP traffic Which ports are enabled for UDP traffic Which ports are listening for traf-
fic Which ports have established an active session Example: NETSTAT a NETSTAT is
extremely useful in discovering if the network adapter’s access to the internet through
standard ports such as 21, 25, 80, etc are blocked or disabled possibly indicating that
there is a firewall preventing data traffic.
NETSH
The NETSH command provides complete control over all network protocols installed in
Microsoft Windows.
2
1.4 Conclusion
1. All commands tested successfully
3
Experiment 2
2.1 Aim
Configure a Network topology using packet tracer Software
2.2 Software
Operating System, Packet Tracer
2.3 Theory
Star Topology: In star Topology, multiple devices are connected to a central connection
point known as hub or switch. Devices are attached to the switch by using either copper
cable or fiber optic cable. Star networks provide a cost-effective method for sharing infor-
mation between different users. Star topology can be used in airline reservation counters
and small business offices where employees want an access to common applications and
files.
4
The basic structure of star topology is shown in figure.
Data passed through the hub before reaching the destination. For example, device A
wants to transmit data to device B. device A first sends data to the hub. If the hub is
passive, it broadcast the data to all the device in star network, except device A. each de-
vice has to read the address specified in data to determine if the data is intended foe that
device. If the address is different, then that data is discarded. If the address matches then
the data is received. If the hub is active, it regenerates the data before it is broadcasted.
A physical star network that used a central hub operates as per logical bus topology. The
hub broadcast data to all segments that thus uses a bus topology for transmission of data.
On the other hand, a physical star network using a switch functions as per logical star
topology. This is because the switch has a capacity to read the address mentioned in data
and to direct the data to the intended receiver.
Advantages:
1. Easy to install, configure and manage
2. Easy to detect faulty device
3. Easier to expand
4. Connecting or removing devices does not the affect the network
5. Switch provides a centralized management
Disadvantages:
1. Increased devices causes traffic which makes the network slow
2. Requires more cable length than a linear topology
3. Hub failure leas to network failure
4. More expensive
5
2.4 Simulation
2.5 Conclusion
Topologies simulated successfully
6
Experiment 3
3.1 Aim
Build class A Class B Network using router in packet tracer tools
3.2 Software
Cisco Packet Tracer
3.3 Theory
IP Address
A unique address mostly used by computers to communicate over a network that use IP
as its basic protocol is known as IP address. IP address is a unique number assigned to
any device operating on a network, for example, computer, routers, printers, internet fax
machine. Hence, an IP address is used to identify the devices in a network.
Generally, we do not assign an IO address to a computer rather we assign it for the inter-
face i.e. the Network Interface Card (NIC). So, if you have two NIC’s in your computer
than you have to assign two IP addresses for both NIC;s to communicate to the same or
two different network.
7
To take the IP address easier to read and interpret, they are written in decimal format
where a point is separated by a byte. As each byte is 8-bit long, each number specified
by dotted decimal notation lies between 0 and 255, for example
Binary format 10000000. 00001011. 00000011. 00011111
Dotted decimal format 128. 11. 3. 31
Class A
Class A consists of 8-bit network ID and 24-bit host ID as shown in figure
Class B
Class A consists of 16-bit network ID and 16-bit host ID as shown in figure
8
Class C
Class C addresses consists of 24 bits network ID and 8 bits host ID shown in figure
Class D
Class D address class is designed for multicasting. Each address in this defines a particular
group of host over this internet. This class of address consists of only one block of
address.
Class E
Class E address is reserved for future and experimental use. First byte of class E specifies
decimal values from 240 to 255.
9
Figure 3.2: IP Settings
10
Experiment 4
Installation of Proxy-Server
4.1 Aim
To Install of Proxy-Server
4.2 Software
CC Proxy, Windows 7/8/10
4.3 Theory
Proxy Server
The proxy server acts as an intermediate server that relays requests between a client and
a server. The proxy server keeps track of all the client-server interactions, which allows
you to monitor exactly what is going on, without having to access the main server. The
proxy server evaluates the request according to its filtering rules. For example, it may
filter traffic by IP address or protocol. If the request is validated by the filter, the proxy
provides the resource by connecting to the relevant server and requesting the service on
behalf of the client.
We can use the proxy server to monitor all client-server interaction, regardless of the
11
communication protocol. For example, you can monitor the following protocols:
CCProxy setup
1. LAN networks configuration
CC Proxy only requires that the clients can ping through the server IP address. The IP
address of server that is used to connect with the other LAN client is called the proxy
server address.
· Suppose the server IP address in the LAN is 192.168.0.1, and then 192.168.0.1 is the
proxy server address. Run ccproxysetup.exe and follow the on-screen instructions to in-
stall CC Proxy.
· Run CC Proxy on the server (Figure 3).
If you want to know more about server configurations, please read "Server Configuration".
12
If you get problem in launch CCProxy, please read "CCProxy Start Problem".
13
Experiment 5
Installation of Mail-Server
5.1 Aim
Installation of Mail-Server using MTA
5.2 Software
Ubuntu Linux OS, MTA.
5.3 Theory
A mail server also known as a mail transfer agent or MTA, a mail transport agent, a
mail router or an Internet mailer, is an application that receives incoming e-mail from
local users (people within the same domain) and remote senders and forwards outgoing
e-mail for delivery. A computer dedicated to running such applications is also called a
mail server. Microsoft Exchange, qmail, Exim and sendmail are among the more common
mail server programs.
The mail server works in conjunction with other programs to make up what is some-
times referred to as a messaging system. A messaging system includes all the applications
necessary to keep e-mail moving as it should. When you send an e-mail message, your
e-mail program, such as Outlook or Eudora, forwards the message to your mail server,
which in turn forwards it either to another mail server or to a holding area on the same
server called a message store to be forwarded later. As a rule, the system uses SMTP
(Simple Mail Transfer Protocol) or ESMTP (extended SMTP) for sending e-mail, and
either POP3 (Post Office Protocol 3) or IMAP (Internet Message Access Protocol) for
receiving e-mail
Postfix
Postfix is the default Mail Transfer Agent (MTA) in Ubuntu. It attempts to be fast and
easy to administer and secure. It is compatible with the MTA sendmail.
Installation
To install postfix run the following command: sudo apt-get install postfix Simply press
return when the installation process asks questions, the configuration will be done in
14
greater detail in the next stage.
Configuring SASL:
socket listen
{ # master {\\
# Master socket provides access to userdb information . It ' s typically #
used to give Dovecot ' s local delivery agent access to userdb so it #
can find mailbox locations .\\
# path = / var / run / dovecot / auth - master # mode = 0600\\
# Default user / group is the one who started dovecot - auth ( root ) # user =\\
# group \\
= #}\\
client {\\
# The client socket is generally safe to export to everyone . Typical use #
is to export it to your SMTP server so it can do SMTP AUTH lookups #
using it .\\
path = / var / spool / postfix / private / auth - client mode = 0660\\
user = postfix group = postfix \\
}\\
}\\
In order to let Outlook clients use SMTPAUTH , in the auth default section
of / etc / dovecot / dovecot . conf add " login ":\\
mechanisms = plain login \\
Once you have Dovecot configured restart it with : sudo / etc / init . d / dovecot
restart \\
5.4 Conclusion
Mail Server created successfully
15
Experiment 6
Installation of Web-Server
6.1 Aim
Installation of Web-Server
6.2 Software
Ubuntu, APACHE
6.3 Theory
Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP
address and possibly a domain name. For example, if you enter the URL http://www.ieee.com/index.htm
in your browser, this sends a request to the Web server whose domain name is ieee.com.
The server then fetches the page named index.html and sends it to your browser.
Any computer can be turned into a Web server by installing server software and con-
necting the machine to the Internet. There are many Web server software applications,
including public domain software from NCSA and Apache, and commercial packages from
Microsoft, Netscape and others. Windows 2000 and NT are popular choices for Web server
OS’s. They offer a familiar interface for IT managers and can be easier to install and set
up than Unix Web servers.
Apache - HTTP Web Server
In this practical we are going to install XAMPP which is free and open source cross-
platform web server solution stack package, consisting mainly of the Apache HTTP Server,
MySQL database, and interpreters for scripts written in the PHP and Perl programming
languages. These links will help you install Apache, use Apache, and find other Apache
developers.
16
LAMP is one of the most common web hosting platforms on the Internet, so it’s a great
environment to build and test your website. Follow these step by step instructions to
install and configure LAMP on Ubuntu 12.04. If you have a reasonably fast broadband
connection, you should be done in less than half an hour.
Install LAMP on Ubuntu
The developers at Ubuntu have made it really easy to install and configure the packages
for LAMP with a single terminal command. So open up a terminal window and let’s get
started. sudo apt-get install lamp-server
The apt package manager will now show the packages to be installed and ask for confir-
mation. Hit <Enter> to confirm and continue with the install.
After some time downloading packages, you will be prompted to set a password for the
root user for MySQL.
Set MySQL root password
Enter the password you want to use for MySQL. Do not leave it blank. You’ll be prompted
a second time to confirm your password.
Confirm MySQL root password
After confirming your password, apt will continue installing the remaining packages. Re-
maining LAMP package installation Your LAMP installation is now complete.
Test Apache
Open a web browser window and enter the address http://localhost/. You should see a
web page that says "It Works!"
Test php
Now that you’ve confirmed that the Apache web server works, you want to make sure that
your php installation is working. To do that you need to create a file in /var/www called
testing.php. You can use your favorite text editor as root, or you can use the following
terminal command:
echo "<?phpphpinfo(); ?>" | sudo tee /var/www/testing.php
After that you need to restart the Apache web server. sudo service apache2 restart
Go back to your web browser and enter the address http://localhost/testing.php/ and
you should see a page displaying information about your php installation.
17
Configure MySQL
Since this tutorial is for setting up a local web development environment, the MySQL
needs to be bound to the localhost IP address. By default this should be 127.0.0.1 on
your system. Just in case, you can verify it with these commands. cat /etc/hosts |
greplocalhost
You should see something like 127.0.0.1 localhost :: 1 ip6-localhost ip6-loopback
You now want to verify that you have the correct bind address in MySQL’s my.cnf file.
cat /etc/mysql/my.cnf | grep bind-address You should see: bind-address = 127.0.0.1
If the bind address doesn’t match the one set for localhost on your system, you’ll need to
edit /etc/mysql/my.cnf as root to correct it.
Installing phpMyAdmin
You don’t need to install phpMyAdmin, but unless you’re a wizard with SQL, you’ll want
it to do administrative tasks on your MySQL databases. You can install phpMyAdmin
with this terminal command:
sudo apt-get install libapache2-mod-auth-mysql phpmyadmin
You’ll be prompted to confirm that you want to install the packages. Hit <Enter> to
continue.
You’ll next be prompted to select a web server to configure with phpMyAdmin. This is
important! Use the arrow keys on your keyboard to highlight apache2 and then used the
space bar to select it. Then hit <Enter> to continue. Make sure to click the picture
below to see it in full size:
6.4 Conclusion
Web Server created successfully.
18